Filters








7 Hits in 3.2 sec

Why mechanical design cannot be like VLSI design

Daniel E. Whitney
1996 Research in Engineering Design  
He also acknowledges the many discussions he had with people mentioned in the footnotes who enriched his approach to this topic.  ...  There are standards for a number of commodity items such as fasteners, and ongoing efforts in some industries have led to standards for interchanging business data, but not technical design data.  ...  process description is that if digital logic can be used, system design and device design are decoupled.  ... 
doi:10.1007/bf01608348 fatcat:kxnfmc476nafpo2blepcgiuhuq

Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems [article]

Farn Wang, Geng-Dian Hwang, Fang Yu
2003 arXiv   pre-print
Three numerical coverage metrics for the symbolic simulation of dense-time systems and their estimation methods are presented.  ...  Bluetooth is a widely adopted wireless communication standard in the industry.  ...  The protocol regulates the behavior between a master device and a slave device.  ... 
arXiv:cs/0303027v1 fatcat:6tdk2wcyljfmrgrmjwfezumu2u

Signal propagation in high-speed MCM circuits

C. Truzzi, E. Beyne, E. Ringoot, J. Peeters
Proceedings of ICCD '95 International Conference on Computer Design. VLSI in Computers and Processors  
Timing analyses and circuit simulations were pelfomzed during the design of a MCM consisting of 4 bare 0.7~pm CMOS ASIC's (100 pins, 64 mm2, standard cell technology) transmitting signals at 200 Mbit/s  ...  propagation of the signals, including the combined influence of active devices (drivers and receivers) and coupled, lossy interconnection lines; 2) an accurate overview of the way parameters from diRerent  ...  The simulation tool used for this analysis (Transplus) combines an accurate modelling of the active devices (SPICE level 3 compatible) with an accurate description of the (lossy) transmission lines in  ... 
doi:10.1109/iccd.1995.528784 dblp:conf/iccd/TruzziBRP95 fatcat:4ju7zwangbhy3kb6ppsyobkqzy

The Powerful Antitakeover Force of Staggered Boards: Theory, Evidence, and Policy

Lucian Arye Bebchuk, John C. Coates IV, Guhan Subramanian
2002 Social Science Research Network  
We also find that an ESB nearly doubled the odds of remaining independent for an average target in our data set, from 34% to 61%, halved the odds that a first bidder would be successful, from 34% to 14%  ...  Overall, we estimate that, in the period studied, ESBs reduced the returns of shareholders of hostile bid targets on the order of 8-10%.  ...  If not, Forms 8-K and 10-Q, as well as news stories in Lexis/News, available at http://www.lexis.com, were reviewed to confirm SDC data on the bid, its characteristic, and outcomes.  ... 
doi:10.2139/ssrn.304388 fatcat:rd7bbprj2ba6vcbn5rvoedyixy

Comprehensive frequency-dependent substrate noise analysis using boundary element methods

Hongmei Li, J. Carballido, H.H. Yu, V.I. Okhmatovski, E. Rosenbaum, A.C. Cangellaris
IEEE/ACM International Conference on Computer Aided Design, 2002. ICCAD 2002.  
Abstract We present a new method of built-in-self-test (BIST) for sequential circuits and system-on-achip (SOC) using characteristic faults and circuit-specific spectral information in the form of one  ...  Often, descriptions of those subsystems are only available in the frequency-doma in.  ...  Standby Current," IEEE Transactions on Electron Devices, Vol. 48, No. 9, Sept. 2001, pp 2050-2057. [5] Stathis, J.H., "Physical and Predictive Models of Ultra Thin Oxide Reliability in CMOS Devices and  ... 
doi:10.1109/iccad.2002.1167506 fatcat:xsqqw7lg2zcbnk5y7uyqfhebnq

Security for a High Performance Commodity Storage Subsystem (CMU-CS-99-160)

Howard Gobioff
2018
Based on the performance limitations of software cryptography demonstrated in a prototype implementation of a network attached storage device, I propose and evaluate an alternative to standard message  ...  As storage devices move from behind the protection of a server and become first-class network entities in their own right, they must become actively involved in protecting themselves from network attacks  ...  When an application runs in a server attached system, the fileserver is able to serialize all requests and form a single audit log for multiple storage devices.  ... 
doi:10.1184/r1/6619781.v1 fatcat:7rm72qdqjfbutiqaivqm43uwie

Embedded Security for Network-Attached Storage (CMU-CS-99-154)

Howard Gobioff, David Nagle, Garth Gibson
2018
Central to this work is an alternative cryptographic approach, called "Hash and MAC", that reduces the cost of protecting the integrity of read traffic in storage devices that are unable to generate a  ...  Optimizing Security Performance for Storage Storage Characteristics Storage has numerous characteristics that can be exploited to better optimize the performance of security.  ...  For capabilities, a simple form of access credentials, the check requires only a few cycles to perform some simple comparisons.  ... 
doi:10.1184/r1/6619565 fatcat:ldk4ndymabgt5pjflmrczl3hc4